Журнал лабораторных работ

Содержание

Журнал

Понедельник (11/30/09)

/dev/ttypc
11:27:54
#ping
PING 192.168.16.254 (192.168.16.254) 56(84) bytes of data.
64 bytes from 192.168.16.254: icmp_seq=1 ttl=64 time=0.157 ms
64 bytes from 192.168.16.254: icmp_seq=2 ttl=64 time=0.087 ms
64 bytes from 192.168.16.254: icmp_seq=3 ttl=64 time=0.077 ms
64 bytes from 192.168.16.254: icmp_seq=4 ttl=64 time=0.084 ms
64 bytes from 192.168.16.254: icmp_seq=5 ttl=64 time=0.118 ms
64 bytes from 192.168.16.254: icmp_seq=6 ttl=64 time=0.066 ms
64 bytes from 192.168.16.254: icmp_seq=7 ttl=64 time=0.103 ms
64 bytes from 192.168.16.254: icmp_seq=8 ttl=64 time=0.085 ms
64 bytes from 192.168.16.254: icmp_seq=9 ttl=64 time=0.077 ms
...
64 bytes from 192.168.16.254: icmp_seq=23 ttl=64 time=0.082 ms
64 bytes from 192.168.16.254: icmp_seq=24 ttl=64 time=0.064 ms
64 bytes from 192.168.16.254: icmp_seq=25 ttl=64 time=0.096 ms
64 bytes from 192.168.16.254: icmp_seq=26 ttl=64 time=0.110 ms
64 bytes from 192.168.16.254: icmp_seq=27 ttl=64 time=0.086 ms
64 bytes from 192.168.16.254: icmp_seq=28 ttl=64 time=0.088 ms
64 bytes from 192.168.16.254: icmp_seq=29 ttl=64 time=0.071 ms
--- 192.168.16.254 ping statistics ---
29 packets transmitted, 29 received, 0% packet loss, time 28003ms
rtt min/avg/max/mdev = 0.064/0.088/0.157/0.017 ms
11:29:03
#traceroute -n nt.ua
traceroute to nt.ua (212.40.34.157), 30 hops max, 40 byte packets
 1  192.168.16.254  1.866 ms  0.244 ms  0.374 ms
 2  10.0.1.1  2.095 ms  0.495 ms  0.389 ms
 3  192.168.1.1  1.900 ms  1.773 ms  1.582 ms
 4  212.40.51.73  5.735 ms  5.722 ms  5.494 ms
 5  89.209.0.25  5.986 ms  5.626 ms  8.771 ms
 6  212.40.34.157  6.203 ms  7.546 ms  6.214 ms
11:30:28
#traceroute
traceroute to nt.ua (212.40.34.157), 30 hops max, 40 byte packets
 1  debian (192.168.16.254)  1.845 ms  0.336 ms  0.065 ms
 2  medusa.tech.inc (10.0.1.1)  0.568 ms  0.476 ms  0.417 ms
 3  192.168.1.1 (192.168.1.1)  1.566 ms  1.595 ms  1.561 ms
 4  gi0-0-215.puma.tsua.net (212.40.51.73)  5.781 ms  6.111 ms  6.838 ms
 5  ge0-2-506.p1.l9.kyiv.tsua.net (89.209.0.25)  6.619 ms  7.301 ms  5.518 ms
 6  stream.tsua.net (212.40.34.157)  6.115 ms  5.885 ms  6.674 ms
11:31:06
#traceroute google.com
traceroute: Warning: google.com has multiple addresses; using 74.125.53.100
traceroute to google.com (74.125.53.100), 30 hops max, 40 byte packets
 1  debian (192.168.16.254)  1.992 ms  0.149 ms  0.255 ms
 2  medusa.tech.inc (10.0.1.1)  1.410 ms  0.509 ms  0.438 ms
 3  192.168.1.1 (192.168.1.1)  1.600 ms  1.422 ms  1.539 ms
 4  193.200.68.189 (193.200.68.189)  4.360 ms  3.477 ms  4.011 ms
 5  193.200.69.241 (193.200.69.241)  5.629 ms  4.586 ms  4.382 ms
 6  min-edu2.gw.itsinternet.net (213.133.162.221)  6.731 ms  12.087 ms  4.324 ms
 7  quoll.itsinternet.net (213.133.160.52)  43.133 ms  43.295 ms  44.359 ms
 8  google-gw.itsinternet.net (213.133.164.166)  5.932 ms  4.497 ms  6.555 ms
 9  209.85.249.22 (209.85.249.22)  49.692 ms  49.880 ms  50.074 ms
10  209.85.250.140 (209.85.250.140)  57.463 ms  67.349 ms 72.14.232.208 (72.14.232.208)  56.508 ms
11  72.14.233.62 (72.14.233.62)  81.807 ms 209.85.248.81 (209.85.248.81)  62.911 ms 72.14.233.62 (72.14.233.62)  93.758 ms
12  209.85.250.54 (209.85.250.54)  146.971 ms  134.333 ms  150.201 ms
13  209.85.251.233 (209.85.251.233)  186.973 ms 216.239.46.14 (216.239.46.14)  182.336 ms  158.697 ms
14  216.239.43.80 (216.239.43.80)  206.415 ms 72.14.233.116 (72.14.233.116)  211.833 ms  212.647 ms
15  209.85.250.126 (209.85.250.126)  204.921 ms 72.14.239.12 (72.14.239.12)  214.436 ms  213.691 ms
16  216.239.48.32 (216.239.48.32)  213.634 ms  214.311 ms  215.694 ms
17  216.239.48.139 (216.239.48.139)  213.875 ms 64.233.174.129 (64.233.174.129)  210.104 ms 216.239.48.139 (216.239.48.139)  223.399 ms
18  72.14.232.2 (72.14.232.2)  212.189 ms 72.14.232.6 (72.14.232.6)  219.822 ms  219.439 ms
19  pw-in-f100.1e100.net (74.125.53.100)  212.911 ms  211.674 ms  204.726 ms
11:32:24
#nmap
bash: nmap: command not found
11:33:09
#apt-get install nmap
Чтение списков пакетов... Готово
Построение дерева зависимостей... Готово
Будут установлены следующие дополнительные пакеты:
  libpcre3
НОВЫЕ пакеты, которые будут установлены:
  libpcre3 nmap
обновлено 0, установлено 2 новых пакетов, для удаления отмечено 0 пакетов, и 55 пакетов не обновлено.
Необходимо скачать 932kБ архивов.
После распаковки объем занятого дискового пространства возрастёт на 2863kB.
Хотите продолжить [Д/н]?
Получено:1 http://debian.org.ua etch/main libpcre3 6.7+7.4-4 [197kB]
Получено:2 http://debian.org.ua etch/main nmap 4.11-1 [736kB]
Получено 932kB за 0s (1089kB/c)
Выбор ранее не выбранного пакета libpcre3.
(Чтение базы данных... на данный момент установлено 22712 файлов и каталогов.)
Распаковывается пакет libpcre3 (из файла .../libpcre3_6.7+7.4-4_i386.deb)...
Выбор ранее не выбранного пакета nmap.
Распаковывается пакет nmap (из файла .../archives/nmap_4.11-1_i386.deb)...
Настраивается пакет libpcre3 (6.7+7.4-4) ...
Настраивается пакет nmap (4.11-1) ...
11:33:27
#nmap -p 22 '192.168.16.*'
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2009-11-30 12:34 EET
Interesting ports on 192.168.16.1:
PORT   STATE SERVICE
22/tcp open  ssh
MAC Address: 00:16:3E:00:00:01 (Xensource)
Interesting ports on debian2.sergey.net.nt (192.168.16.2):
PORT   STATE SERVICE
22/tcp open  ssh
MAC Address: 00:16:3E:00:00:02 (Xensource)
Interesting ports on debian3.stepanoff.net.nt (192.168.16.3):
...
MAC Address: 00:14:C2:05:A3:1B (Hewlett Packard)
Interesting ports on 192.168.16.252:
PORT   STATE SERVICE
22/tcp open  ssh
MAC Address: 00:15:60:7A:1D:C0 (Hewlett Packard)
Interesting ports on 192.168.16.254:
PORT   STATE SERVICE
22/tcp open  ssh
MAC Address: 00:04:75:75:46:B1 (3 Com)
Nmap finished: 256 IP addresses (20 hosts up) scanned in 10.132 seconds
11:34:33
#nmap -O 192.168.16.254
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2009-11-30 12:35 EET
Interesting ports on 192.168.16.254:
Not shown: 1672 closed ports
PORT     STATE SERVICE
21/tcp   open  ftp
22/tcp   open  ssh
53/tcp   open  domain
80/tcp   open  http
111/tcp  open  rpcbind
2049/tcp open  nfs
3128/tcp open  squid-http
9999/tcp open  abyss
MAC Address: 00:04:75:75:46:B1 (3 Com)
Device type: general purpose
Running: Linux 2.4.X|2.5.X
OS details: Linux 2.4.0 - 2.5.20
Uptime 1.777 days (since Sat Nov 28 17:55:46 2009)
Nmap finished: 1 IP address (1 host up) scanned in 2.055 seconds
11:35:07
#nmap -O 10.0.2.2
Starting Nmap 4.11 ( http://www.insecure.org/nmap/ ) at 2009-11-30 12:35 EET
Interesting ports on 10.0.2.2:
Not shown: 1676 closed ports
PORT     STATE SERVICE
135/tcp  open  msrpc
139/tcp  open  netbios-ssn
445/tcp  open  microsoft-ds
3389/tcp open  ms-term-serv
Device type: general purpose
Running: Microsoft Windows 2003/.NET
OS details: Microsoft Windows 2003 Server SP1
Nmap finished: 1 IP address (1 host up) scanned in 3.458 seconds
11:35:50
#ping -s 9011 192.168.16.10
PING 192.168.16.10 (192.168.16.10) 9011(9039) bytes of data.
9019 bytes from 192.168.16.10: icmp_seq=1 ttl=64 time=0.300 ms
9019 bytes from 192.168.16.10: icmp_seq=2 ttl=64 time=0.353 ms
9019 bytes from 192.168.16.10: icmp_seq=3 ttl=64 time=0.349 ms
9019 bytes from 192.168.16.10: icmp_seq=4 ttl=64 time=0.290 ms
9019 bytes from 192.168.16.10: icmp_seq=5 ttl=64 time=0.259 ms
--- 192.168.16.10 ping statistics ---
5 packets transmitted, 5 received, 0% packet loss, time 4002ms
rtt min/avg/max/mdev = 0.259/0.310/0.353/0.037 ms
11:39:23
#ping -s 9011 192.168.16.0
[root@debian13:~]# ping -s 9011 192.168.16.1
PING 192.168.16.1 (192.168.16.1) 9011(9039) bytes of data.
9019 bytes from 192.168.16.1: icmp_seq=2 ttl=64 time=0.273 ms
--- 192.168.16.1 ping statistics ---
2 packets transmitted, 1 received, 50% packet loss, time 1004ms
rtt min/avg/max/mdev = 0.273/0.273/0.273/0.000 ms
PING 192.168.16.01 (192.168.16.1) 9011(9039) bytes of data.
9019 bytes from 192.168.16.1: icmp_seq=1 ttl=64 time=0.517 ms
9019 bytes from 192.168.16.1: icmp_seq=2 ttl=64 time=0.228 ms
9019 bytes from 192.168.16.1: icmp_seq=3 ttl=64 time=0.292 ms
9019 bytes from 192.168.16.1: icmp_seq=4 ttl=64 time=0.273 ms
^C9019 bytes from 192.168.16.1: icmp_seq=5 ttl=64 time=0.268 ms
9019 bytes from 192.168.16.1: icmp_seq=6 ttl=64 time=0.259 ms
--- 192.168.16.01 ping statistics ---
6 packets transmitted, 6 received, 0% packet loss, time 4998ms
rtt min/avg/max/mdev = 0.228/0.306/0.517/0.096 ms
11:39:30
#ping 1

11:39:43
#ping 10.0.35.01
[root@debian13:~]# ping 10.0.35.1
PING 10.0.35.1 (10.0.35.1) 56(84) bytes of data.
64 bytes from 10.0.35.1: icmp_seq=1 ttl=63 time=0.329 ms
64 bytes from 10.0.35.1: icmp_seq=2 ttl=63 time=0.238 ms
--- 10.0.35.1 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1001ms
rtt min/avg/max/mdev = 0.238/0.283/0.329/0.048 ms
PING 10.0.35.01 (10.0.35.1) 56(84) bytes of data.
64 bytes from 10.0.35.1: icmp_seq=1 ttl=63 time=0.375 ms
^X
--- 10.0.35.01 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.375/0.375/0.375/0.000 ms
11:39:45
#ping 10.00.35.1
PING 10.00.35.1 (10.0.35.1) 56(84) bytes of data.
64 bytes from 10.0.35.1: icmp_seq=1 ttl=63 time=0.345 ms
64 bytes from 10.0.35.1: icmp_seq=2 ttl=63 time=0.255 ms
--- 10.00.35.1 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 999ms
rtt min/avg/max/mdev = 0.255/0.300/0.345/0.045 ms
11:39:55
#man traceroute
/dev/ttypb
11:42:44
#vi /etc/gdm/gdm.conf
/dev/ttype
11:48:26
#firefox
(firefox-bin:4492): Gtk-WARNING **: cannot open display:
/dev/ttypc
11:53:39
#vlock
 *** This tty is not a VC (virtual console). ***
 *** It may not be securely locked. ***
This TTY is now locked by root.
Please press Enter to unlock.
Password:
Try to authenticate as root instead:
Password:
 *** Unlock failed; please try again. ***
This TTY is now locked by root.
Please press Enter to unlock.
...
 *** Unlock failed; please try again. ***
This TTY is now locked by root.
Please press Enter to unlock.
Password:
Try to authenticate as root instead:
Password:
 *** Unlock failed; please try again. ***
This TTY is now locked by root.
Please press Enter to unlock.
Password:
прошло 50 минут
12:44:26
#rootpass
bash: rootpass: command not found
12:44:33
#ifconfigundc
bash: ifconfigundc: command not found
12:46:42
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
172.16.0.0      0.0.0.0         255.255.0.0     U     0      0        0 local
0.0.0.0         192.168.16.254  0.0.0.0         UG    0      0        0 eth0
/dev/ttyp2
12:54:23
#screen -x
/dev/ttypc
13:03:27
#apt-get install ipcalc
Чтение списков пакетов... Готово
Построение дерева зависимостей... Готово
НОВЫЕ пакеты, которые будут установлены:
  ipcalc
обновлено 0, установлено 1 новых пакетов, для удаления отмечено 0 пакетов, и 55 пакетов не обновлено.
Необходимо скачать 26,4kБ архивов.
После распаковки объем занятого дискового пространства возрастёт на 131kB.
Получено:1 http://debian.org.ua etch/main ipcalc 0.41-1 [26,4kB]
Получено 26,4kB за 0s (123kB/c)
Выбор ранее не выбранного пакета ipcalc.
(Чтение базы данных... на данный момент установлено 22801 файлов и каталогов.)
Распаковывается пакет ipcalc (из файла .../archives/ipcalc_0.41-1_all.deb)...
Настраивается пакет ipcalc (0.41-1) ...
прошло 30 минут
13:33:31
#ipcalc 192.168.99.0/24 /27
Address:   192.168.99.0         11000000.10101000.01100011. 00000000
Netmask:   255.255.255.0 = 24   11111111.11111111.11111111. 00000000
Wildcard:  0.0.0.255            00000000.00000000.00000000. 11111111
=>
Network:   192.168.99.0/24      11000000.10101000.01100011. 00000000
HostMin:   192.168.99.1         11000000.10101000.01100011. 00000001
HostMax:   192.168.99.254       11000000.10101000.01100011. 11111110
Broadcast: 192.168.99.255       11000000.10101000.01100011. 11111111
Hosts/Net: 254                   Class C, Private Internet
Subnets after transition from /24 to /27
...
Broadcast: 192.168.99.223       11000000.10101000.01100011.110 11111
Hosts/Net: 30                    Class C, Private Internet
 8.
Network:   192.168.99.224/27    11000000.10101000.01100011.111 00000
HostMin:   192.168.99.225       11000000.10101000.01100011.111 00001
HostMax:   192.168.99.254       11000000.10101000.01100011.111 11110
Broadcast: 192.168.99.255       11000000.10101000.01100011.111 11111
Hosts/Net: 30                    Class C, Private Internet
Subnets:   8
Hosts:     240
13:33:59
#ipcalc 192.168.99.0/24 /27
[root@debian13:~]# ipcalc 192.168.99.0/24 /27 | less
Address:   192.168.99.0         11000000.10101000.01100011. 00000000
Netmask:   255.255.255.0 = 24   11111111.11111111.11111111. 00000000
Wildcard:  0.0.0.255            00000000.00000000.00000000. 11111111
=>
Network:   192.168.99.0/24      11000000.10101000.01100011. 00000000
HostMin:   192.168.99.1         11000000.10101000.01100011. 00000001
HostMax:   192.168.99.254       11000000.10101000.01100011. 11111110
Broadcast: 192.168.99.255       11000000.10101000.01100011. 11111111
Hosts/Net: 254                   Class C, Private Internet
...
Broadcast: 192.168.99.223       11000000.10101000.01100011.110 11111
Hosts/Net: 30                    Class C, Private Internet
 8.
Network:   192.168.99.224/27    11000000.10101000.01100011.111 00000
HostMin:   192.168.99.225       11000000.10101000.01100011.111 00001
HostMax:   192.168.99.254       11000000.10101000.01100011.111 11110
Broadcast: 192.168.99.255       11000000.10101000.01100011.111 11111
Hosts/Net: 30                    Class C, Private Internet
Subnets:   8
Hosts:     240
13:34:08
#q
bash: q: command not found
прошло 18 минут
13:52:50
#ssh 192.168.16.254
root@192.168.16.254's password:
Linux debian 2.6.18.8-xen #1 SMP Wed Nov 5 11:18:00 EET 2008 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
Last login: Mon Nov 30 10:14:11 2009 from linux13.net.nt
debian:~# ssh 192.168.16.11
@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@
...
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.11' (RSA) to the list of known hosts.
Last login: Sun May 24 13:24:59 2009 from 192.168.16.254
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1670; pidfile=/root/.lilalo/l3-agent.pid
13:54:08
#ifconfig
eth0      Link encap:Ethernet  HWaddr 00:16:3E:00:00:11
          inet addr:192.168.16.11  Bcast:192.168.16.255  Mask:255.255.255.0
          inet6 addr: fe80::216:3eff:fe00:11/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:5026 errors:0 dropped:0 overruns:0 frame:0
          TX packets:3874 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:330684 (322.9 KiB)  TX bytes:717455 (700.6 KiB)
eth1      Link encap:Ethernet  HWaddr 00:16:3E:00:01:11
          inet addr:192.168.99.222  Bcast:192.168.99.223  Mask:255.255.255.224
...
          collisions:0 txqueuelen:1000
          RX bytes:1498 (1.4 KiB)  TX bytes:1126 (1.0 KiB)
lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:0 errors:0 dropped:0 overruns:0 frame:0
          TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:0 (0.0 b)  TX bytes:0 (0.0 b)
13:54:11
#ifconfig | less
13:54:27
#ping 192.168.1
PING 192.168.1 (192.168.0.1) 56(84) bytes of data.
--- 192.168.1 ping statistics ---
2 packets transmitted, 0 received, 100% packet loss, time 1007ms
13:54:35
#ping 192.168.99.193
PING 192.168.99.193 (192.168.99.193) 56(84) bytes of data.
64 bytes from 192.168.99.193: icmp_seq=1 ttl=64 time=0.586 ms
64 bytes from 192.168.99.193: icmp_seq=2 ttl=64 time=0.254 ms
--- 192.168.99.193 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 999ms
rtt min/avg/max/mdev = 0.254/0.420/0.586/0.166 ms
13:54:46
#ifconfig | less
13:55:00
#ping 192.168.99.161
PING 192.168.99.161 (192.168.99.161) 56(84) bytes of data.
64 bytes from 192.168.99.161: icmp_seq=1 ttl=64 time=2.18 ms
--- 192.168.99.161 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 2.180/2.180/2.180/0.000 ms
13:55:08
#exit
exit
Connection to 192.168.16.10 closed.
debian:~# ssh 192.168.16.8
The authenticity of host '192.168.16.8 (192.168.16.8)' can't be established.
RSA key fingerprint is 51:5b:32:d8:70:19:6d:04:c7:b4:11:49:13:74:dc:bc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.8' (RSA) to the list of known hosts.
Last login: Sun May 24 13:24:59 2009 from 192.168.16.254
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1902; pidfile=/root/.lilalo/l3-agent.pid
13:55:20
#ifconfig | less
13:56:42
#exit
[root@debian8:~]# ping 192.168.99.129
PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data.
+++
--- 192.168.99.129 ping statistics ---
40 packets transmitted, 0 received, 100% packet loss, time 39009ms
exit
Connection to 192.168.16.8 closed.
debian:~# ssh 192.168.16.10
Last login: Mon Nov 30 14:54:46 2009 from debian.net.nt
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1961; pidfile=/root/.lilalo/l3-agent.pid
13:57:01
#exit
exit
Connection to 192.168.16.10 closed.
debian:~# ssh 192.168.16.8
Last login: Mon Nov 30 14:55:20 2009 from debian.net.nt
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1902; pidfile=/root/.lilalo/l3-agent.pid
13:57:27
#exit
[root@debian8:~]# ping 192.168.99.129
PING 192.168.99.129 (192.168.99.129) 56(84) bytes of data.
64 bytes from 192.168.99.129: icmp_seq=6 ttl=64 time=4.09 ms
64 bytes from 192.168.99.129: icmp_seq=7 ttl=64 time=0.342 ms
64 bytes from 192.168.99.129: icmp_seq=8 ttl=64 time=0.296 ms
64 bytes from 192.168.99.129: icmp_seq=9 ttl=64 time=0.275 ms
64 bytes from 192.168.99.129: icmp_seq=10 ttl=64 time=0.252 ms
64 bytes from 192.168.99.129: icmp_seq=11 ttl=64 time=0.242 ms
64 bytes from 192.168.99.129: icmp_seq=12 ttl=64 time=0.241 ms
64 bytes from 192.168.99.129: icmp_seq=13 ttl=64 time=0.244 ms
...
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.7' (RSA) to the list of known hosts.
Last login: Sun May 24 13:24:59 2009 from 192.168.16.254
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=3172; pidfile=/root/.lilalo/l3-agent.pid
13:57:37
#ping 192.168.99.97
PING 192.168.99.97 (192.168.99.97) 56(84) bytes of data.
64 bytes from 192.168.99.97: icmp_seq=1 ttl=64 time=1.53 ms
--- 192.168.99.97 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 1.539/1.539/1.539/0.000 ms
13:58:00
#ping 192.168.99.65
[root@debian7:~]# exit
exit
Connection to 192.168.16.7 closed.
debian:~# ssh 192.168.16.5
The authenticity of host '192.168.16.5 (192.168.16.5)' can't be established.
RSA key fingerprint is 51:5b:32:d8:70:19:6d:04:c7:b4:11:49:13:74:dc:bc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.5' (RSA) to the list of known hosts.
Last login: Sun May 24 13:24:59 2009 from 192.168.16.254
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1583; pidfile=/root/.lilalo/l3-agent.pid
PING 192.168.99.65 (192.168.99.65) 56(84) bytes of data.
64 bytes from 192.168.99.65: icmp_seq=1 ttl=64 time=3.90 ms
--- 192.168.99.65 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 3.903/3.903/3.903/0.000 ms
13:58:17
#ping 192.168.99.33
[root@debian5:~]# exit
exit
Connection to 192.168.16.5 closed.
debian:~# ssh 192.168.16.4
The authenticity of host '192.168.16.4 (192.168.16.4)' can't be established.
RSA key fingerprint is 51:5b:32:d8:70:19:6d:04:c7:b4:11:49:13:74:dc:bc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.4' (RSA) to the list of known hosts.
\\Last login: Sun May 24 13:24:59 2009 from 192.168.16.254
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=2455; pidfile=/root/.lilalo/l3-agent.pid
PING 192.168.99.33 (192.168.99.33) 56(84) bytes of data.
64 bytes from 192.168.99.33: icmp_seq=1 ttl=64 time=0.419 ms
--- 192.168.99.33 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 0.419/0.419/0.419/0.000 ms
13:58:24
#exit
exit
Connection to 192.168.16.4 closed.
debian:~# ssh 192.168.16.2
The authenticity of host '192.168.16.2 (192.168.16.2)' can't be established.
RSA key fingerprint is 51:5b:32:d8:70:19:6d:04:c7:b4:11:49:13:74:dc:bc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.2' (RSA) to the list of known hosts.
Last login: Sun May 24 13:24:59 2009 from 192.168.16.254
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1713; pidfile=/root/.lilalo/l3-agent.pid
13:58:30
#ping 192.168.99.1
PING 192.168.99.1 (192.168.99.1) 56(84) bytes of data.
64 bytes from 192.168.99.1: icmp_seq=1 ttl=64 time=1.37 ms
64 bytes from 192.168.99.1: icmp_seq=2 ttl=64 time=0.278 ms
64 bytes from 192.168.99.1: icmp_seq=3 ttl=64 time=0.282 ms
64 bytes from 192.168.99.1: icmp_seq=4 ttl=64 time=0.266 ms
64 bytes from 192.168.99.1: icmp_seq=5 ttl=64 time=0.261 ms
64 bytes from 192.168.99.1: icmp_seq=6 ttl=64 time=0.274 ms
64 bytes from 192.168.99.1: icmp_seq=7 ttl=64 time=0.266 ms
--- 192.168.99.1 ping statistics ---
7 packets transmitted, 7 received, 0% packet loss, time 6001ms
rtt min/avg/max/mdev = 0.261/0.429/1.376/0.386 ms
13:58:42
#route delete default

14:00:50
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.32   0.0.0.0         255.255.255.224 U     0      0        0 eth2
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
14:00:55
#route delete default
SIOCDELRT: No such process
14:01:00
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.32   0.0.0.0         255.255.255.224 U     0      0        0 eth2
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
14:01:02
#route add dafault gw 192.168.99.30
dafault: Unknown host
14:02:37
#route add dafault
dafault: Unknown host
14:02:45
#route add de

14:02:52
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.32   0.0.0.0         255.255.255.224 U     0      0        0 eth2
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
0.0.0.0         192.168.99.30   0.0.0.0         UG    0      0        0 eth1
14:02:54
#route delete

14:03:22
#route add default gw 192.168.99.62

14:03:36
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.32   0.0.0.0         255.255.255.224 U     0      0        0 eth2
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
0.0.0.0         192.168.99.62   0.0.0.0         UG    0      0        0 eth2
14:03:38
#traceroute ya.ru
traceroute: Warning: ya.ru has multiple addresses; using 77.88.21.8
traceroute to ya.ru (77.88.21.8), 30 hops max, 40 byte packets
 1  * *
14:05:23
#exit
exit
Connection to 192.168.16.2 closed.
debian:~# ssh 192.168.16.1
The authenticity of host '192.168.16.1 (192.168.16.1)' can't be established.
RSA key fingerprint is 51:5b:32:d8:70:19:6d:04:c7:b4:11:49:13:74:dc:bc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.1' (RSA) to the list of known hosts.
Last login: Mon Nov 30 12:08:13 2009 from 192.168.16.2
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1871; pidfile=/root/.lilalo/l3-agent.pid
14:06:55
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
14:06:59
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
0.0.0.0         192.168.99.30   0.0.0.0         UG    0      0        0 eth1
14:07:07
#ping 192.168.99.30
PING 192.168.99.30 (192.168.99.30) 56(84) bytes of data.
64 bytes from 192.168.99.30: icmp_seq=1 ttl=64 time=1.01 ms
64 bytes from 192.168.99.30: icmp_seq=2 ttl=64 time=0.293 ms
--- 192.168.99.30 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1000ms
rtt min/avg/max/mdev = 0.293/0.653/1.014/0.361 ms
14:07:19
#ping 192.168.99.33
PING 192.168.99.33 (192.168.99.33) 56(84) bytes of data.
64 bytes from 192.168.99.33: icmp_seq=1 ttl=64 time=1.73 ms
64 bytes from 192.168.99.33: icmp_seq=2 ttl=64 time=0.271 ms
--- 192.168.99.33 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 1005ms
rtt min/avg/max/mdev = 0.271/1.003/1.736/0.733 ms
14:07:27
#ping 192.168.99.62
PING 192.168.99.62 (192.168.99.62) 56(84) bytes of data.
--- 192.168.99.62 ping statistics ---
4 packets transmitted, 0 received, 100% packet loss, time 3002ms
14:07:39
#ping 192.168.99.30
PING 192.168.99.30 (192.168.99.30) 56(84) bytes of data.
64 bytes from 192.168.99.30: icmp_seq=1 ttl=64 time=1.13 ms
--- 192.168.99.30 ping statistics ---
1 packets transmitted, 1 received, 0% packet loss, time 0ms
rtt min/avg/max/mdev = 1.131/1.131/1.131/0.000 ms
/dev/ttype
14:08:21
#ssh 192.168.16.2
The authenticity of host '192.168.16.2 (192.168.16.2)' can't be established.
RSA key fingerprint is 51:5b:32:d8:70:19:6d:04:c7:b4:11:49:13:74:dc:bc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '192.168.16.2' (RSA) to the list of known hosts.
root@192.168.16.2's password:
Last login: Mon Nov 30 14:58:30 2009 from debian.net.nt
Linux debiant 2.6.18-5-xen-686 #1 SMP Fri Jun 1 05:05:24 UTC 2007 i686
The programs included with the Debian GNU/Linux system are free software;
the exact distribution terms for each program are described in the
individual files in /usr/share/doc/*/copyright.
Debian GNU/Linux comes with ABSOLUTELY NO WARRANTY, to the extent
permitted by applicable law.
l3-agent is already running: pid=1713; pidfile=/root/.lilalo/l3-agent.pid
14:08:30
#ifconfig
\eth0      Link encap:Ethernet  HWaddr 00:16:3E:00:00:02
          inet addr:192.168.16.2  Bcast:192.168.16.255  Mask:255.255.255.0
          inet6 addr: fe80::216:3eff:fe00:2/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:368052 errors:0 dropped:0 overruns:0 frame:0
          TX packets:383198 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000
          RX bytes:44296549 (42.2 MiB)  TX bytes:33988322 (32.4 MiB)
eth1      Link encap:Ethernet  HWaddr 00:16:3E:00:01:02
          inet addr:192.168.99.30  Bcast:192.168.99.31  Mask:255.255.255.224
...
          collisions:0 txqueuelen:1000
          RX bytes:1946 (1.9 KiB)  TX bytes:2078 (2.0 KiB)
lo        Link encap:Local Loopback
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:16436  Metric:1
          RX packets:20 errors:0 dropped:0 overruns:0 frame:0
          TX packets:20 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:0
          RX bytes:1696 (1.6 KiB)  TX bytes:1696 (1.6 KiB)
14:08:56
#tcpdump -i eth1 -n icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
15:09:27.584447 IP 192.168.99.1 > 192.168.99.30: ICMP echo request, id 62223, seq 1, length 64
15:09:27.584622 IP 192.168.99.30 > 192.168.99.1: ICMP echo reply, id 62223, seq 1, length 64
15:09:48.316239 IP 192.168.99.1 > 192.168.99.33: ICMP echo request, id 64271, seq 1, length 64
15:09:48.316272 IP 192.168.99.33 > 192.168.99.1: ICMP echo reply, id 64271, seq 1, length 64
15:09:49.315289 IP 192.168.99.1 > 192.168.99.33: ICMP echo request, id 64271, seq 2, length 64
15:09:49.315307 IP 192.168.99.33 > 192.168.99.1: ICMP echo reply, id 64271, seq 2, length 64
15:10:00.321608 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 1, length 64
15:10:01.332001 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 2, length 64
...
15:11:39.338128 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 100, length 64
15:11:40.338248 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 101, length 64
15:11:41.338266 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 102, length 64
15:11:42.338366 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 103, length 64
15:11:43.338364 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 104, length 64
15:11:44.338433 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 105, length 64
15:11:45.338480 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 106, length 64
112 packets captured
112 packets received by filter
0 packets dropped by kernel
/dev/ttypc
14:09:28
#ping 192.168.99.33
PING 192.168.99.33 (192.168.99.33) 56(84) bytes of data.
64 bytes from 192.168.99.33: icmp_seq=1 ttl=64 time=0.855 ms
64 bytes from 192.168.99.33: icmp_seq=2 ttl=64 time=0.285 ms
--- 192.168.99.33 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 999ms
rtt min/avg/max/mdev = 0.285/0.570/0.855/0.285 ms
14:09:49
#ping 192.168.99.62
64 bytes from 192.168.99.62: icmp_seq=572 ttl=63 time=0.483 ms
64 bytes from 192.168.99.62: icmp_seq=573 ttl=63 time=0.472 ms
64 bytes from 192.168.99.62: icmp_seq=574 ttl=63 time=0.502 ms
64 bytes from 192.168.99.62: icmp_seq=575 ttl=63 time=0.476 ms
64 bytes from 192.168.99.62: icmp_seq=576 ttl=63 time=0.514 ms
64 bytes from 192.168.99.62: icmp_seq=577 ttl=63 time=0.492 ms
64 bytes from 192.168.99.62: icmp_seq=578 ttl=63 time=0.477 ms
64 bytes from 192.168.99.62: icmp_seq=579 ttl=63 time=0.447 ms
64 bytes from 192.168.99.62: icmp_seq=580 ttl=63 time=0.504 ms
64 bytes from 192.168.99.62: icmp_seq=581 ttl=63 time=0.470 ms
...
64 bytes from 192.168.99.62: icmp_seq=710 ttl=63 time=0.501 ms
64 bytes from 192.168.99.62: icmp_seq=711 ttl=63 time=0.426 ms
64 bytes from 192.168.99.62: icmp_seq=712 ttl=63 time=0.434 ms
64 bytes from 192.168.99.62: icmp_seq=713 ttl=63 time=0.453 ms
64 bytes from 192.168.99.62: icmp_seq=714 ttl=63 time=0.476 ms
64 bytes from 192.168.99.62: icmp_seq=715 ttl=63 time=0.486 ms
64 bytes from 192.168.99.62: icmp_seq=716 ttl=63 time=0.469 ms
--- 192.168.99.62 ping statistics ---
716 packets transmitted, 333 received, 53% packet loss, time 715059ms
rtt min/avg/max/mdev = 0.391/0.467/0.616/0.036 ms
/dev/ttype
14:13:33
#echo 1 > /proc/sys/net/ipv4/ip_forward
[root@debian2:~]# tcpdump -i eth1 -n icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
15:11:48.338723 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 109, length 64
15:11:49.338814 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 110, length 64
15:11:50.338827 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 111, length 64
15:11:51.338862 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 112, length 64
15:11:52.338975 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 113, length 64
15:11:53.339008 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 114, length 64
15:11:54.339063 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 115, length 64
...
15:13:26.344835 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 207, length 64
15:13:27.344903 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 208, length 64
15:13:28.344962 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 209, length 64
15:13:29.345022 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 210, length 64
15:13:30.345099 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 211, length 64
15:13:31.345189 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 212, length 64
15:13:32.345245 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 213, length 64
105 packets captured
106 packets received by filter
0 packets dropped by kernel
14:14:57
#echo 1 > /proc/sys/net/ipv4/ip_forward
[root@debian2:~]# tcpdump -i eth1 -n icmp
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth1, link-type EN10MB (Ethernet), capture size 96 bytes
15:13:59.346920 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 240, length 64
15:14:00.346943 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 241, length 64
15:14:01.346987 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 242, length 64
15:14:02.347054 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 243, length 64
15:14:03.347143 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 244, length 64
15:14:04.347201 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 245, length 64
15:14:05.347258 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 246, length 64
...
15:14:51.350160 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 292, length 64
15:14:52.350226 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 293, length 64
15:14:53.350228 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 294, length 64
15:14:54.350348 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 295, length 64
15:14:55.350409 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 296, length 64
15:14:56.350464 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 297, length 64
15:14:57.350501 IP 192.168.99.1 > 192.168.99.62: ICMP echo request, id 784, seq 298, length 64
59 packets captured
59 packets received by filter
0 packets dropped by kernel
14:16:24
#sysclt -a
bash: sysclt: command not found
14:16:34
#sysctl
net.ipv4.route.gc_interval = 60
net.ipv4.route.gc_timeout = 300
net.ipv4.route.gc_min_interval_ms = 500
net.ipv4.route.gc_min_interval = 0
net.ipv4.route.max_size = 524288
net.ipv4.route.gc_thresh = 32768
net.ipv4.route.max_delay = 10
net.ipv4.route.min_delay = 2
error: "Operation not permitted" reading key "net.ipv4.route.flush"
net.ipv4.icmp_errors_use_inbound_ifaddr = 0
...
fs.lease-break-time = 45
fs.dir-notify-enable = 1
fs.leases-enable = 1
fs.overflowgid = 65534
fs.overflowuid = 65534
fs.dentry-state = 57422 56302   45      0       0       0
fs.file-max = 55238
fs.file-nr = 640        0       55238
fs.inode-state = 54058  0       0       0       0       0       0
fs.inode-nr = 54058     0
14:16:53
#sysctl -a | grep forwarding
error: "Operation not permitted" reading key "net.ipv6.route.flush"
error: "Operation not permitted" reading key "net.ipv4.route.flush"
net.ipv6.conf.eth2.forwarding = 0
net.ipv6.conf.eth1.forwarding = 0
net.ipv6.conf.default.forwarding = 0
net.ipv6.conf.all.forwarding = 0
net.ipv6.conf.eth0.forwarding = 0
net.ipv6.conf.lo.forwarding = 0
net.ipv4.conf.eth2.mc_forwarding = 0
net.ipv4.conf.eth2.forwarding = 1
net.ipv4.conf.eth1.mc_forwarding = 0
net.ipv4.conf.eth1.forwarding = 1
net.ipv4.conf.eth0.mc_forwarding = 0
net.ipv4.conf.eth0.forwarding = 1
net.ipv4.conf.lo.mc_forwarding = 0
net.ipv4.conf.lo.forwarding = 1
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 1
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 1
14:17:05
#sysctl -a | grep forward
error: "Operation not permitted" reading key "net.ipv6.route.flush"
error: "Operation not permitted" reading key "net.ipv4.route.flush"
net.ipv6.conf.eth2.forwarding = 0
net.ipv6.conf.eth1.forwarding = 0
net.ipv6.conf.default.forwarding = 0
net.ipv6.conf.all.forwarding = 0
net.ipv6.conf.eth0.forwarding = 0
net.ipv6.conf.lo.forwarding = 0
net.ipv4.conf.eth2.mc_forwarding = 0
net.ipv4.conf.eth2.forwarding = 1
net.ipv4.conf.eth1.mc_forwarding = 0
net.ipv4.conf.eth1.forwarding = 1
net.ipv4.conf.eth0.mc_forwarding = 0
net.ipv4.conf.eth0.forwarding = 1
net.ipv4.conf.lo.mc_forwarding = 0
net.ipv4.conf.lo.forwarding = 1
net.ipv4.conf.default.mc_forwarding = 0
net.ipv4.conf.default.forwarding = 1
net.ipv4.conf.all.mc_forwarding = 0
net.ipv4.conf.all.forwarding = 1
net.ipv4.ip_forward = 1
14:17:19
#sysctl net.ipv4.ip_forward=0
net.ipv4.ip_forward = 0
14:17:45
#cat /proc/sys/net/ipv4/ip_forward
0
14:18:12
#sysctl net.ipv4.ip_forward=1
net.ipv4.ip_forward = 1
14:18:23
#vim /etc/sysctl.conf
14:19:20
#vim /etc/sysctl.conf
14:19:27
#vim /etc/sysctl.conf
/dev/ttypc
14:21:56
#ping ya.ru
PING ya.ru (213.180.204.8) 56(84) bytes of data.
--- ya.ru ping statistics ---
14 packets transmitted, 0 received, 100% packet loss, time 13009ms
14:24:14
#sysctl -f
net.ipv4.ip_forward = 1
14:31:12
#sysctl -f
net.ipv4.ip_forward = 1
14:35:34
#ping 192.168.99.33
[root@debian1:~]#
PING 192.168.99.33 (192.168.99.33) 56(84) bytes of data.
64 bytes from 192.168.99.33: icmp_seq=1 ttl=64 time=0.564 ms
64 bytes from 192.168.99.33: icmp_seq=2 ttl=64 time=0.235 ms
--- 192.168.99.33 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 999ms
rtt min/avg/max/mdev = 0.235/0.399/0.564/0.165 ms
14:38:15
#ping 192.168.99.62
PING 192.168.99.62 (192.168.99.62) 56(84) bytes of data.
64 bytes from 192.168.99.62: icmp_seq=1 ttl=63 time=0.929 ms
64 bytes from 192.168.99.62: icmp_seq=2 ttl=63 time=0.459 ms
--- 192.168.99.62 ping statistics ---
2 packets transmitted, 2 received, 0% packet loss, time 999ms
rtt min/avg/max/mdev = 0.459/0.694/0.929/0.235 ms
14:38:25
#route -n
[root@debian1:~]#
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
0.0.0.0         192.168.99.30   0.0.0.0         UG    0      0        0 eth1
14:38:34
#route -n
Kernel IP routing table
Destination     Gateway         Genmask         Flags Metric Ref    Use Iface
192.168.99.0    0.0.0.0         255.255.255.224 U     0      0        0 eth1
192.168.16.0    0.0.0.0         255.255.255.0   U     0      0        0 eth0
0.0.0.0         192.168.99.30   0.0.0.0         UG    0      0        0 eth1
14:42:47
#ping ya.ru
[root@debian1:~]# ping 192.168.99.222
PING 192.168.99.222 (192.168.99.222) 56(84) bytes of data.
64 bytes from 192.168.99.222: icmp_seq=1 ttl=58 time=3.58 ms
64 bytes from 192.168.99.222: icmp_seq=2 ttl=58 time=1.50 ms
64 bytes from 192.168.99.222: icmp_seq=3 ttl=58 time=1.54 ms
64 bytes from 192.168.99.222: icmp_seq=4 ttl=58 time=1.80 ms
64 bytes from 192.168.99.222: icmp_seq=5 ttl=58 time=1.49 ms
64 bytes from 192.168.99.222: icmp_seq=6 ttl=58 time=1.47 ms
--- 192.168.99.222 ping statistics ---
6 packets transmitted, 6 received, 0% packet loss, time 5001ms
rtt min/avg/max/mdev = 1.476/1.901/3.586/0.762 ms
PING ya.ru (93.158.134.8) 56(84) bytes of data.
--- ya.ru ping statistics ---
162 packets transmitted, 0 received, 100% packet loss, time 161009ms
14:48:15
#screen -x
/dev/ttyp1
14:48:59
#screen -x
/dev/ttypc
14:49:08
#screen
14:58:56
#screen -x
прошло 52 минуты
/dev/ttyp2
15:51:10
#screen -x
прошло 29 минут
/dev/ttyp3
16:20:52
#ping ya.ru
PING ya.ru (93.158.134.8) 56(84) bytes of data.
64 bytes from ya.ru (93.158.134.8): icmp_seq=1 ttl=51 time=71.4 ms
--- ya.ru ping statistics ---
2 packets transmitted, 1 received, 50% packet loss, time 999ms
rtt min/avg/max/mdev = 71.478/71.478/71.478/0.000 ms
/dev/ttyp2
16:20:52
#ping ya.ru
PING ya.ru (93.158.134.8) 56(84) bytes of data.
64 bytes from ya.ru (93.158.134.8): icmp_seq=1 ttl=51 time=71.4 ms
--- ya.ru ping statistics ---
2 packets transmitted, 1 received, 50% packet loss, time 999ms
rtt min/avg/max/mdev = 71.478/71.478/71.478/0.000 ms
/dev/ttyp3
16:20:56
#apt-get install cowsay
Чтение списков пакетов... Готово
Построение дерева зависимостей
Чтение информации о состоянии... Готово
Предлагаемые пакеты:
  filters
НОВЫЕ пакеты, которые будут установлены:
  cowsay
обновлено 0, установлено 1 новых пакетов, для удаления отмечено 0 пакетов, и 262 пакетов не обновлено.
Необходимо скачать 19,8kБ архивов.
После данной операции, объём занятого дискового пространства возрастёт на 295kB.
Получено:1 http://10.0.35.1 lenny/main cowsay 3.03-9.2 [19,8kB]
Получено 19,8kБ за 0s (746kБ/c)
Выбор ранее не выбранного пакета cowsay.
(Чтение базы данных... на данный момент установлено 24803 файлов и каталогов.)
Распаковывается пакет cowsay (из файла .../cowsay_3.03-9.2_all.deb)...
Настраивается пакет cowsay (3.03-9.2) ...
/dev/ttyp2
16:20:56
#apt-get install cowsay
Чтение списков пакетов... Готово
Построение дерева зависимостей
Чтение информации о состоянии... Готово
Предлагаемые пакеты:
  filters
НОВЫЕ пакеты, которые будут установлены:
  cowsay
обновлено 0, установлено 1 новых пакетов, для удаления отмечено 0 пакетов, и 262 пакетов не обновлено.
Необходимо скачать 19,8kБ архивов.
После данной операции, объём занятого дискового пространства возрастёт на 295kB.
Получено:1 http://10.0.35.1 lenny/main cowsay 3.03-9.2 [19,8kB]
Получено 19,8kБ за 0s (746kБ/c)
Выбор ранее не выбранного пакета cowsay.
(Чтение базы данных... на данный момент установлено 24803 файлов и каталогов.)
Распаковывается пакет cowsay (из файла .../cowsay_3.03-9.2_all.deb)...
Настраивается пакет cowsay (3.03-9.2) ...
/dev/ttyp3
16:22:12
#dpkg -L cowsay
/.
/usr
/usr/games
/usr/games/cowsay
/usr/share
/usr/share/cowsay
/usr/share/cowsay/cows
/usr/share/cowsay/cows/beavis.zen.cow
/usr/share/cowsay/cows/bong.cow
/usr/share/cowsay/cows/bud-frogs.cow
...
/usr/share/doc/cowsay
/usr/share/doc/cowsay/README
/usr/share/doc/cowsay/copyright
/usr/share/doc/cowsay/changelog.gz
/usr/share/doc/cowsay/changelog.Debian.gz
/usr/share/man
/usr/share/man/man6
/usr/share/man/man6/cowsay.6.gz
/usr/games/cowthink
/usr/share/man/man6/cowthink.6.gz
/dev/ttyp2
16:22:12
#dpkg -L cowsay
/.
/usr
/usr/games
/usr/games/cowsay
/usr/share
/usr/share/cowsay
/usr/share/cowsay/cows
/usr/share/cowsay/cows/beavis.zen.cow
/usr/share/cowsay/cows/bong.cow
/usr/share/cowsay/cows/bud-frogs.cow
...
/usr/share/doc/cowsay
/usr/share/doc/cowsay/README
/usr/share/doc/cowsay/copyright
/usr/share/doc/cowsay/changelog.gz
/usr/share/doc/cowsay/changelog.Debian.gz
/usr/share/man
/usr/share/man/man6
/usr/share/man/man6/cowsay.6.gz
/usr/games/cowthink
/usr/share/man/man6/cowthink.6.gz
16:23:02
#dpkg -L cowsay

/dev/ttyp3
16:23:02
#dpkg -L cowsay

16:23:02
#dpkg -L cowsay
/.
/usr
/usr/games
/usr/games/cowsay
/usr/share
/usr/share/cowsay
/usr/share/cowsay/cows
/usr/share/cowsay/cows/beavis.zen.cow
/usr/share/cowsay/cows/bong.cow
/usr/share/cowsay/cows/bud-frogs.cow
...
/usr/share/doc/cowsay
/usr/share/doc/cowsay/README
/usr/share/doc/cowsay/copyright
/usr/share/doc/cowsay/changelog.gz
/usr/share/doc/cowsay/changelog.Debian.gz
/usr/share/man
/usr/share/man/man6
/usr/share/man/man6/cowsay.6.gz
/usr/games/cowthink
/usr/share/man/man6/cowthink.6.gz

Файлы

  • /proc/sys/net/ipv4/ip_forward
  • /proc/sys/net/ipv4/ip_forward
    >
    0
    

    Статистика

    Время первой команды журнала11:27:54 2009-11-30
    Время последней команды журнала16:23:02 2009-11-30
    Количество командных строк в журнале101
    Процент команд с ненулевым кодом завершения, %13.86
    Процент синтаксически неверно набранных команд, % 6.93
    Суммарное время работы с терминалом *, час 2.70
    Количество командных строк в единицу времени, команда/мин 0.62
    Частота использования команд
    ping25|=======================| 23.15%
    route16|==============| 14.81%
    sysctl7|======| 6.48%
    screen6|=====| 5.56%
    exit6|=====| 5.56%
    dpkg5|====| 4.63%
    ifconfig5|====| 4.63%
    traceroute4|===| 3.70%
    nmap4|===| 3.70%
    apt-get4|===| 3.70%
    vim3|==| 2.78%
    less3|==| 2.78%
    ip_forward2|=| 1.85%
    ipcalc2|=| 1.85%
    echo2|=| 1.85%
    grep2|=| 1.85%
    ssh2|=| 1.85%
    firefox1|| 0.93%
    q1|| 0.93%
    man1|| 0.93%
    rootpass1|| 0.93%
    tcpdump1|| 0.93%
    sysclt1|| 0.93%
    ifconfigundc1|| 0.93%
    vi1|| 0.93%
    cat1|| 0.93%
    vlock1|| 0.93%
    ____
    *) Интервалы неактивности длительностью 30 минут и более не учитываются

    Справка

    Для того чтобы использовать LiLaLo, не нужно знать ничего особенного: всё происходит само собой. Однако, чтобы ведение и последующее использование журналов было как можно более эффективным, желательно иметь в виду следующее:
    1. В журнал автоматически попадают все команды, данные в любом терминале системы.

    2. Для того чтобы убедиться, что журнал на текущем терминале ведётся, и команды записываются, дайте команду w. В поле WHAT, соответствующем текущему терминалу, должна быть указана программа script.

    3. Команды, при наборе которых были допущены синтаксические ошибки, выводятся перечёркнутым текстом:
      $ l s-l
      bash: l: command not found
      

    4. Если код завершения команды равен нулю, команда была выполнена без ошибок. Команды, код завершения которых отличен от нуля, выделяются цветом.
      $ test 5 -lt 4
      Обратите внимание на то, что код завершения команды может быть отличен от нуля не только в тех случаях, когда команда была выполнена с ошибкой. Многие команды используют код завершения, например, для того чтобы показать результаты проверки

    5. Команды, ход выполнения которых был прерван пользователем, выделяются цветом.
      $ find / -name abc
      find: /home/devi-orig/.gnome2: Keine Berechtigung
      find: /home/devi-orig/.gnome2_private: Keine Berechtigung
      find: /home/devi-orig/.nautilus/metafiles: Keine Berechtigung
      find: /home/devi-orig/.metacity: Keine Berechtigung
      find: /home/devi-orig/.inkscape: Keine Berechtigung
      ^C
      

    6. Команды, выполненные с привилегиями суперпользователя, выделяются слева красной чертой.
      # id
      uid=0(root) gid=0(root) Gruppen=0(root)
      

    7. Изменения, внесённые в текстовый файл с помощью редактора, запоминаются и показываются в журнале в формате ed. Строки, начинающиеся символом "<", удалены, а строки, начинающиеся символом ">" -- добавлены.
      $ vi ~/.bashrc
      2a3,5
      >    if [ -f /usr/local/etc/bash_completion ]; then
      >         . /usr/local/etc/bash_completion
      >        fi
      

    8. Для того чтобы изменить файл в соответствии с показанными в диффшоте изменениями, можно воспользоваться командой patch. Нужно скопировать изменения, запустить программу patch, указав в качестве её аргумента файл, к которому применяются изменения, и всавить скопированный текст:
      $ patch ~/.bashrc
      В данном случае изменения применяются к файлу ~/.bashrc

    9. Для того чтобы получить краткую справочную информацию о команде, нужно подвести к ней мышь. Во всплывающей подсказке появится краткое описание команды.

      Если справочная информация о команде есть, команда выделяется голубым фоном, например: vi. Если справочная информация отсутствует, команда выделяется розовым фоном, например: notepad.exe. Справочная информация может отсутствовать в том случае, если (1) команда введена неверно; (2) если распознавание команды LiLaLo выполнено неверно; (3) если информация о команде неизвестна LiLaLo. Последнее возможно для редких команд.

    10. Большие, в особенности многострочные, всплывающие подсказки лучше всего показываются браузерами KDE Konqueror, Apple Safari и Microsoft Internet Explorer. В браузерах Mozilla и Firefox они отображаются не полностью, а вместо перевода строки выводится специальный символ.

    11. Время ввода команды, показанное в журнале, соответствует времени начала ввода командной строки, которое равно тому моменту, когда на терминале появилось приглашение интерпретатора

    12. Имя терминала, на котором была введена команда, показано в специальном блоке. Этот блок показывается только в том случае, если терминал текущей команды отличается от терминала предыдущей.

    13. Вывод не интересующих вас в настоящий момент элементов журнала, таких как время, имя терминала и других, можно отключить. Для этого нужно воспользоваться формой управления журналом вверху страницы.

    14. Небольшие комментарии к командам можно вставлять прямо из командной строки. Комментарий вводится прямо в командную строку, после символов #^ или #v. Символы ^ и v показывают направление выбора команды, к которой относится комментарий: ^ - к предыдущей, v - к следующей. Например, если в командной строке было введено:

      $ whoami
      
      user
      
      $ #^ Интересно, кто я?
      
      в журнале это будет выглядеть так:
      $ whoami
      
      user
      
      Интересно, кто я?

    15. Если комментарий содержит несколько строк, его можно вставить в журнал следующим образом:

      $ whoami
      
      user
      
      $ cat > /dev/null #^ Интересно, кто я?
      
      Программа whoami выводит имя пользователя, под которым 
      мы зарегистрировались в системе.
      -
      Она не может ответить на вопрос о нашем назначении 
      в этом мире.
      
      В журнале это будет выглядеть так:
      $ whoami
      user
      
      Интересно, кто я?
      Программа whoami выводит имя пользователя, под которым
      мы зарегистрировались в системе.

      Она не может ответить на вопрос о нашем назначении
      в этом мире.
      Для разделения нескольких абзацев между собой используйте символ "-", один в строке.

    16. Комментарии, не относящиеся непосредственно ни к какой из команд, добавляются точно таким же способом, только вместо симолов #^ или #v нужно использовать символы #=

    17. Содержимое файла может быть показано в журнале. Для этого его нужно вывести с помощью программы cat. Если вывод команды отметить симоволами #!, содержимое файла будет показано в журнале в специально отведённой для этого секции.
    18. Для того чтобы вставить скриншот интересующего вас окна в журнал, нужно воспользоваться командой l3shot. После того как команда вызвана, нужно с помощью мыши выбрать окно, которое должно быть в журнале.
    19. Команды в журнале расположены в хронологическом порядке. Если две команды давались одна за другой, но на разных терминалах, в журнале они будут рядом, даже если они не имеют друг к другу никакого отношения.
      1
          2
      3   
          4
      
      Группы команд, выполненных на разных терминалах, разделяются специальной линией. Под этой линией в правом углу показано имя терминала, на котором выполнялись команды. Для того чтобы посмотреть команды только одного сенса, нужно щёкнуть по этому названию.

    О программе

    LiLaLo (L3) расшифровывается как Live Lab Log.
    Программа разработана для повышения эффективности обучения Unix/Linux-системам.
    (c) Игорь Чубин, 2004-2008

    $Id$